MIT Sloan School of Management MIT Sloan School Working Paper 4754-09 Explorations in Cyber International Relations (ECIR) – Data Dashboard Report #1: CERT Data Sources and Prototype Dashboard System Stuart Madnick, Nazli Choucri, Steven Camina, Erik Fogg, Xitong Li, Fan Wei © Stuart Madnick, Nazli Choucri, Steven Camina, Erik Fogg, Xitong Li, Fan Wei All rights reserved. Short sections of text, not to exceed two paragraphs, may be quoted without explicit permission, provided that full credit including © notice is given to the source. This paper also can be downloaded without charge from the Social Science Research Network Electronic Paper Collection: http://ssrn.com/abstract=1477618 Electronic copy available at: http://ssrn.com/abstract=1477618 Explorations in Cyber International Relations (ECIR) – Data Dashboard Report #1: CERT Data Sources and Prototype Dashboard System Stuart Madnick, Nazli Choucri, Steven Camina, Erik Fogg, Xitong Li, Fan Wei Working Paper CISL# 2009-07 August 2009 Composite Information Systems Laboratory (CISL) Sloan School of Management, Room E53-320 Massachusetts Institute of Technology Cambridge, MA 02142 Electronic copy available at: http://ssrn.com/abstract=1477618 1 Explorations in Cyber International Relations (ECIR) Data Dashboard Report #1: CERT Data Sources and Prototype Dashboard System Prof. Stuart Madnick Prof. Nazli Choucri Steven Camina Erik Fogg Xitong Li Fan Wei 10 August 2009 ABSTRACT Growing global interconnection and interdependency of computer networks, in combination with increased sophistication of cyber attacks over time, demonstrate the need for better understanding of the collective and cooperative security measures needed to prevent and respond to cybersecurity emergencies. The Exploring Cyber International Relations (ECIR) Data Dashboard project is an initial effort to gather and analyze such data within and between countries. This report describes the prototype ECIR Data Dashboard and the initial data sources used. In 1988, the United States Department of Defense and Carnegie Mellon University formed the Computer Emergency Response Team (CERT) to lead and coordinate national and international efforts to combat cybsersecurity threats. Since then, the number of CERTs worldwide has grown dramatically, leading to the potential for a sophisticated and coordinated global cybersecurity response network. This report focuses primarily on the current state of the worldwide CERTs, including the data publicly available, the extent of coordination, and the maturity of data management and responses. The report summarizes, analyses, and critiques the worldwide CERT network. Additionally, the report describes the ECIR team's Data Dashboard project, designed to provide scholars, policymakers, IT professionals, and other stakeholders with a comprehensive set of data on national-level cybersecurity, information technology, and demographic data. The Dashboard allows these stakeholders to observe chronological trends and multivariate correlations that can lead to insight into the current state, potential future trends, and approximate causes of global cybersecurity issues. This report summarizes the purpose, state, progress, and challenges of developing the Data Dashboard project. Disclaimer: This report relies on publicly available information, especially from the CERTs’ pubic web sites. They have not yet been contacted to confirm our understanding of their data. That will be done in subsequent phases of this effort. © Copyright MIT, 2009 Electronic copy available at: http://ssrn.com/abstract=1477618 2 1. Introduction The development of the modern economy, and of sophisticated information technology in particular, has led to an increasing global interconnectivity and interdependence. Such interconnectivity deeply benefits commerce and communication, but collectivizes vulnerabilities and security problems to a state the international community has not before had to address. The development of collective and collaborative cybersecurity has been formally underway for more than twenty years, and much progress has been made. Nonetheless, there remain many opportunities to further develop collaborative and decentralized collective cybersecurity networks and procedures. The purpose of this report is twofold: first, the report explores and summarizes the state of collaboration and information availability from the oldest and most-developed formal institutions of collaborative cybersecurity: the Computer Emergency Response Teams (CERTs), and identifies potential shortcomings and areas for development. Second, we introduce the reader to the Data Dashboard project, conducted under the auspices of the Exploring Cyber International Relations (ECIR) team at MIT and Harvard. The Dashboard will function as a simple, easy-to-use source on global and nation-level data, with specific emphasis on cybersecurity and threat data, as well as on related current events. The Dashboard is designed to help researchers, policymakers, IT professionals, and other stakeholders to track potentially critical trends in relevant cybersecurity data, including attacks, threats, vulnerabilities, and defenses, etc. Increasing stakeholder access to summary and analytical data should significantly increase the efficacy of cybersecurity efforts at all levels, including individual and institutional defense, corporate and national policymaking, and high-level coordination and cooperation. Well-known collectors of relevant nation-level cybersecurity data are the Computer Emergency Response Teams, or CERTs. The largest CERTs typically operate at a national level as quasigovernmental entities (that is, a country has its own CERT), but have a mandate to coordinate extensively with other CERTs within the country and in other countries, often under the auspices of the CERT Coordination Center (CERT/CC) operated by Carnegie Mellon University (CMU). While highly diverse, and often in infancy, these CERTs have the potential to not only provide critical cybersecurity data to all stakeholders, but also to coordinate responses to cyber attacks or to other cyber emergencies. A brief history, summary, and analysis of national-level CERT activities and their publicly available data are discussed below. 2. Computer Emergency Response Teams (CERTs) 2.1 History and Purpose of CERTs The first CERT, at Carnegie Mellon University (CMU), was launched in 1988 with funding from DARPA, as a response to the Morris Worm attack (which took down perhaps 10% of the Internet during November, 1988). The CERT mandate is now to develop and promote best management practices and technology applications to “resist attacks on networked systems, to limit damage, and to 3 ensure continuity of critical services.”1 The CMU CERT, during the 1990s, began to help other countries develop their own CERTs and maintains to this day a formal Computer Security Incident Response Team (CSIRT) development program2, including for the United States. The CERT at CMU is now officially known as the CERT Coordination Center (CERT/CC), as many other response teams have chosen the name CERT (where others have chosen CSIRT). The Coordination Center works closely with US-CERT, the latter of which is an indirect branch of the Department of Homeland Security. It uses a largely decentralized approach to prevention of security failures (in education and training, helping create local CERTS, publishing information, etc), but is ready to lead a coordinated response with US-CERT and other local CERTs in order to stamp out major security failures or major threats. CERT/CC works in the following fields; these fields provide a guideline for the work of other national CERTs and CSIRTs around the world: z Software Awareness: Searches for, receives, analyzes, and reports major software security vulnerabilities and malicious code. Publishes advice on responses to vulnerabilities and threats, helping to create software more secure to attack. z Secure Systems: Engineering of networks that have high situational awareness and high response speed to deal with coordinated attacks. Goal is to create networks that can survive attack and continue functioning. z Organizational Security: Encourages and helps develop implementation of proper security management and software in individual organizations. Advocates government policy that increases security of national, corporate, and private systems. z Coordinated Response: Helps create and train response teams for different organizations, governments, and companies, including the Department of Homeland Security (US-CERT), and the National Computer Security Incident Response Team (CSIRT) of Qatar. Thanks largely to this training, the United States has dozens of smaller CSIRTs (that belong to enterprises or industry organizations) that work together to deal with high-risk threats, and to perform forensics on past security breaches. z Education and Training: Provides public training seminars, certification training/testing, as well as collegiate degrees at CMU. The interconnected nature of modern computer networking assures that major failures in the security of a single institution have the potential to create larger damage to other institutions, or even large portions of the Internet. To solve the collective action problem, CERTs were designed with decentralization and coordination in mind. Ideally, the national CERTs would overlook an array of CERTs at various levels below. CERTs within a single company or institution, in a sector, etc, would work with each other under the auspices of the national CERT in order to offer both robust prevention and monitoring capability and a decentralized, distributed response to emergencies and attacks that may arise. This ideal configuration would lead to an efficient coordination between organizations 1 http://www.cert.org 2 http://www.cert.org/csirts/ 4 ranging from semi-government to non-profit to private/corporate to ensure both collective and individual security. Figure 1.1 (below) provides an abstract diagram of the potential hierarchies and responsibilities of a distributed CERT system. Figure 1.1: Ideal CERT Hierarchy and Relationship3 As can be seen from Figure 1.1, the national CERT is intended to coordinate the activities of the other internal CERTS, such as those of individual enterprises, of industry organizations, and NGO/semigovernmental organizational CERTs for different sectors of the economy. Vendor CERTs would be responsible for ensuring that state-of-the-art security is embedded in software, to prevent the spread of vulnerabilities. Commercial and internal CERTs would work together to disseminate best security practices to large enterprises. National and sector CERTs would collect and organize cybersecurity information, and coordinate active responses to major cyberseucrity threats or breaches. 2.2 Current Status and Breadth In reality, the CERT security structure remains in its infancy in most countries that do have national CERTs, and the ideal CERT network (as explained above) is not even fully developed in the CERT's origin nation, the United States. Many countries do not have CERTs, but significant progress has been made over the past two decades in increasing the population of national CERTs and other CERT 3 http://www.first.org/resources/guides/cert-in-a-box/images/6.jpg 5 institutions in many countries with a large Internet user population or Internet-centric economy. While there is no authoritative centralized list of national CERT programs, the following list of 54 countries provides those that the authors have found. There are certainly other countries with some sort of cybersecurity teams, but these CERTs are more specifically national-level, cooperative, educating, and responsive organizations. Countries with National CERTs4 • Argentina • Australia • Austria • Bangladesh • Brazil • Brunei • Canada • Chile • China (PRC) • Croatia • Czech Republic • Denmark • Estonia • Finland • France • Germany • Greece • Hong Kong • Hungary • Iceland • India • Indonesia • Ireland • Israel • Italy • Japan • Latvia • Lithuania • Malaysia • Mexico • Myanmar • Norway • Pakistan • Philippines • Poland • Portugal • Qatar • Republic of Korea • Russia • Singapore • Slovenia • Spain • Sri Lanka • Sweden • Switzerland • Taiwan (ROC) • Thailand • Tunisia • Turkey • UAE • UK • United States • Uraguay • Vietnam Table 2.1: Countries with National CERTs Most large enterprises have dedicated IT security teams, some of which are called CSIRTs or even CERTs (but many of which are not).5 These cybersecurity teams are often the targets of solicited surveys for collecting incident information and are the points of contact for dissemination of best practices and threat alerts. 2.3 General Data Availability from CERTs 4 From http://www.first.org/about/organization/teams/ and http://www.apcert.org/about/structure/members.html 5 Some examples can be seen here: http://www.first.org/about/organization/teams/ 6 Many of the national CERTs collect information on a number of cybersecurity issues in their countries by year, quarter, or month. Information collection, in general, is conducted by surveys: organizations voluntarily (although often by solicitation) disclose attack types (placed on the organization) and defenses and shortcomings within the organization, etc. In addition, some CERTs have performed data collection through passive probes in their national networks. CERTs often aggregate these data to present nationwide reports on the state of cybersecurity during the reporting period, and trends over time. Some CERTs also ask institutions about their defenses and security technology, as well as request self-criticisms by institutions of their security readiness for different kinds of attacks, and policies, standards, etc, used by different institutions. The aggregated survey method has some interesting methodological artifacts that are worth noting. They are best described by two examples: if a single virus hits 1000 institutions (and they all report), then the virus is counted 1000 times. If 100 viruses hit a single enterprise, an “incident” reporting method will lead to 100 hits, where a “respondents” method will report only one hit (as a “respondents” method simply asks whether the respondent has experienced that specific problem in the reporting period.) An example graph from US-CERT is provided below and then briefly explained. Figure 2.1: Proportional Threat Reports by Quarter to US-CERT6 While each CERT is usually consistent between reporting periods, data consistency between CERTs is limited. CERTs do not have a standardized typology of data: their surveys ask different questions and create different categories of attacks and vulnerabilities. CERTs lack a consistent data presentation method: some present data in absolute numbers of reports, others in percentages only. Term definition across CERTs is also sometimes inconsistent or unclear. Comparison and international aggregation are therefore often difficult, but there are a number of types of data that are commonly reported, in some 6 These types of attacks are the official US-CERT “Incident Category” designations, including “investigation,” which designates an attack whose nature and source are still under investigation. 7 form or another: US-CERT provides the most comprehensive and detailed definition of terms, as explained: “A computer incident within US-CERT is, as defined by NIST Special Publication 800-61, a violation or imminent threat of violation of computer security policies, acceptable use policies, or standard computer security practices.” There are six categories regarding computer incidents used by US-CERT. CAT 1 -- Unauthorized Access: In this category an individual gains logical or physical access without permission to a federal agency network, system, application, data, or other resources. Other reports by US-CERT further elaborate on this definition: “Unauthorized Access is when a person who does not have permission to connect to or use a system gains entry in a manner unintended by the system owner…The specifics are different for each individual event but it could happen in any number of ways. Usually access is gained via unpatched software or other known vulnerabilities.” (“Unauthorized Access”) "Unauthorized access" entails approaching, trespassing within, communicating with, storing data in, retrieving data from, or otherwise intercepting and changing computer resources without consent. These laws relate to either or both, or any other actions that interfere with computers, systems, programs or networks.” (“Computer Hacking and Unauthorized Access Laws.”) CAT 2 -- Denial of Service (DoS): For example: Downloading files causes a significant amount of traffic over the network. This activity may reduce the availability of certain programs on your computer or may limit your access to the internet. (“Cyber Security Tip ST05-007”) “A ‘denial-of-service’ attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. Examples include attempts to "flood" a network, thereby preventing legitimate network traffic, attempts to disrupt connections between two machines, thereby preventing access to a service, attempts to prevent a particular individual from accessing a service , attempts to disrupt service to a specific system or person (…) Other types of attack may include a denial of service as a component, but the denial of service may be part of a larger attack. Illegitimate use of resources may also result in denial of service. For example, an intruder may use your anonymous ftp area as a place to store illegal copies of commercial software, consuming disk space and generating network traffic. There are three basic types of DoS attack: 1) consumption of scarce, limited, or non-renewable resources 2) destruction or alteration of configuration information 3) physical destruction or alteration of network components” CAT 3 -- Malicious Code: Successful installation of malicious software (e.g., virus, worm, spyware, bot, Trojan horse, or other code-based malicious entity that infects or affects an operating system or application). The intent of such malicious code is often to take control of the computer or destroy or change information stored on the computer. Agencies are not required to report malicious logic that has been successfully quarantined by antivirus (AV) software. 8 CAT 4 -- Improper Usage: Violation of acceptable usage policies (as established by the enterprise). CAT 5 -- Scans, Probes, or Attempted Access: any activity that seeks to access or identify a federal agency computer, open ports, protocols, service, or any combination for later exploit. This activity does not directly result in a compromise or denial of service. CAT 6 -- Investigation: Unconfirmed incidents of potentially malicious or anomalous activity deemed by the reporting entity to warrant further review. These definitions are not shared universally by other CERTs, but certainly provide a relatively authoritative guide to what statistical data represents. There are a few methodological concerns beyond incompatibilities that are worth noting. The survey style of information reporting on the part of CERTs means comparisons between nations with otherwise compatible data definitions and typology is difficult. Numerical comparisons can be misleading if the breadth of a survey is not explicitly clear—if both countries survey very different proportions of the population, then their absolute numerical data will be incomparable (though percentages may remain comparable). Additionally, even if survey respondents are relatively accurate, most respond on behalf of institutions—there may be disproportionate weights placed upon different institutions if response rates are significantly different. It is further unclear whether an incident at a large institution should be counted the same way as an incident at a smaller one. 3 Examples of Specific Data Provided by Some CERTs Here we explore data available at select CERTs, including type of vulnerability/threat, frequency of publication, and other relevant information. A table below concisely displays relevant information about the data available at each CERT. Note that not all reports by national CERTs have quantitative data available. Country / Region Reporting Period Data Presentation Data Categories Formation Date Asia-Pacific (Regional) Annual Australia Annual Percentage Many ? Brunei None N/A N/A 05/01/04 Bangladesh None N/A N/A 07/01/07 China Semi-Annual Numerical Website Malicious Code, Spam, Virus/Worm/Trojan, Phishing, Vulnerabilities, Botnet, DoS Attack 10/01/00 Hong Kong Annual Numerical Website Alerts, Virus Alerts, Virus Incidents ? Indonesia Occasional Numerical? ? ? ? 9 India Monthly Numerical Scanning, Malicious Code, Spamming, ? Phishing, SQL Injection, Website Compromise / Malware Injection Japan Quarterly None N/A ? Korea Monthly ? <Data Corrupted> 07/01/96 Malaysia Occasional Numerical DoS Attacks, Viruses/Malicious Code, others 01/13/97 Pakistan Occasional ? Defacement, others? ? Myanmar Unknown N/A (No Website) ? Philippines Unknown N/A (No Website) ? Qatar None None None ? Russia Yearly Numerical Malware, Phishing, DoS, Unauthorized Access, ? Scan/Password Bruteforcing, Others Sri Lanka None None None 06/01/06 Singapore None None None 10/01/99 Taiwan None None None 09/01/87 Thailand None None None 2000 Vietnam None None (No English Version) 12/01/05 Canada None None (No Website) ? USA Quarterly Percentage Unauthorized Access, DoS, Malicious Code, Improper Usage, Scans/Probes/Attempted Access, Under Investigation 11/01/88 Mexico Unknown N/A (No English) ? Argentina None None None 05/01/99 Brazil Quarterly Numerical Worm, Spam, Scanning, DoS, others ? Austria None None (No English) ? Belgium None None None ? Croatia None None None ? Czech Republic None None None 1996 Denmark None None (No English) ? Estonia Yearly Percentage Computer Viruses, Personal Data Abuse, Spam, 2005 others Finland None None None ? France None None None ? Germany Occasional None None ? Greece None None (No English) ? Hungary None None None ? 10 Iceland None None (No Website) ? Ireland None None None ? Israel None None None ? Italy N/A N/A (Must be registered for statistics) 1994 Latvia Occasional Numeric ? ? Lithuania Yearly ? ? ? Netherlands None None None ? Norway Monthly None None ? Poland None None (No Website) 1993 Portugal Monthly None (No English) ? Slovenia None None None ? Spain Yearly Numeric “Vulnerabilities” ? Sweden None None None ? Switzerland ? ? Internet Background Noise 1987 Turkey None None None ? UK None None None ? Table 3.1: Selected National CERT PubliclyAvailable Data To illustrate the types of CERT data available, examples are provided below. These examples are provided largely to emphasize the diversity of data available at CERTs across the world (and, similarly, inter-CERT data inconsistency). The five national CERTs chosen below are the United States, China, India, Russia, and Estonia. 3.1 US-CERT The United States national CERT is affiliated with the Department of Homeland Security, and is a distinctly different entity from CERT/CC at Carnegie Mellon University (which is an independent and academic entity). These two largest US CERTs share information and, in the case of a large-scale attack, will often coordinate extensively in leading a response. Examples of information provided is shown in Figures 3.2, 3.3, and 3.4. 11 Figure 3.2: US-CERT - Incidents by Category, 2008 Q47 Figure 3.3: US-CERT - Top 5 Incidents vs. Others, 2008 Q48 US-CERT Quarterly Trends and Analysis Report Nov 7th, 2008 (http://www.us7 cert.gov/press_room/trendsanalysisQ408.pdf) 8 US-CERT Quarterly Trends and Analysis Report Nov 7th, 2008 (http://www.uscert.gov/press_room/trendsanalysisQ408.pdf) 12 90.00% 80.00% 70.00% 60.00% Phishing Policy Violation Non Cyber Equipment Theft/Loss 50.00% Malware Suspicious Network Activity Others 40.00% 30.00% 20.00% 10.00% 0.00% FY07Q2 FY07Q3 FY07Q4 FY08 Q1 FY08 Q2 FY08 Q3 FY08 Q4 Figure 3.4: US-CERT - Percentages of Top 5 Incidents vs. Others, 2007 Q2 – 2008 Q49 The charts and graph above suggest that the greatest threat by frequency to US institutions and users is some form of attempted information access, namely phishing. The vast majority of threats reported to US-CERT are related to attempts to deceive the user (phishing, malicious website, non-cyber) rather than direct attacks against the defenses of the computer or the network. Figure 3.2 breaks down reported incidents by official US-CERT category; Figures 3.3 and 3.4 describe more specific attacks (each attack falling into one of the official categories). As can be seen, most “Scans, probes, and attempted access” attacks are phishing. Comparing the two graphs, we see that phishing (at 72% of all incidents) makes up the vast majority of attempted access attacks (at 77% of all incidents), suggesting that by far, most access attempts attack the user rather than the software or hardware directly. 9 US-CERT Quarterly Trends and Analysis Report: (http://www.us-cert.gov/reading_room/) Note: a trend line at 0% does not indicate that the incident did not occur, but that it was not a top 5 incident; it is grouped with “others” 13 100 90 80 Percentage of All Responses 70 60 50 40 30 20 10 0 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 Year Denial of service Laptop/mobile Theft Telecom Fraud Unauthorized Access Virus Financial Fraud Insider Abuse System Penetration Sabotage Theft/loss of proprietary info Abuse of wireless network Web site defacement Misuse of Web application Bots DNS attacks Instant messaging abuse Password sniffing Theft/loss of customer data Figure 3.5: US-CERT - Types of Detected Misuse, by Year10 Figure 3.5 describes different sub-categories of misuse of enterprise computing equipment, which can lead to any of the US-CERT categories of attacks. Above we observe a general decline in the most pervasive of misuses over the past 5 years, including viruses, insider abuse, mobile theft, unauthorized access, and denial of service attacks. Proportional increases are seen in a number of “misuses” occur in 2004, which suggests (although we have no confirmation of) their addition to the reporting and collecting mechanisms by US-CERT, rather than sudden onset of their use. Because the above statistics represent a percentage of all respondents (rather than a percentage of all incidents reported), the decline in largest misuses (including viruses, insider abuse, mobile theft, unauthorized access, etc) may be due to an actual reduction in the incident as a problem, suggesting that IT professionals and companies in the US may be responding well to the most prevalent security threats. 10 2008 CSI Computer Crime & Security Survey (http://i.zdnet.com/blogs/csisurvey2008.pdf ) and 2005 CSI/FBI Computer Crime and Security Survey (http://www.cpppe.umd.edu/Bookstore/Documents/2005CSISurvey.pdf) 14 3.2 CN-CERT (China) Examples of the China CERT (CN-CERT) national-level data is shown below. 6000 4926 4707 5000 4000 3466 3123 3000 2459 2000 13791451 1218 874 1000 1262 1030 761 581 169 303 259 434 278 370 331 489 429 418 443 467 528 426 451 561 564 Ja nF e 06 b M -06 ar A -0 6 p M r-06 ay J u 06 n0 Ju 6 l-0 A 6 ug S e 06 pO 06 ct N -06 ov D -06 ec J a 06 nF e 07 b M -07 ar A -0 7 p M r-07 ay -0 Ju 7 n0 Ju 7 l-0 A 7 ug S e 07 pO 07 ct N -07 ov D -07 ec J a 07 nF e 08 b M -08 ar A -0 8 p M r-08 ay J u 08 n08 0 Figure 3.6: Total Incidents Reported to CN-CERT (not including Scanning), Jan 2006 – June 200811 30000 26476 25000 20000 15000 10000 9112 5000 2557 4485 4390 0 2003 2004 2005 2006 2007 Figure 3.7: Total Incidents Reported to CN-CERT (not including scanning) by Year, 2003-200712 11 China-CERT Report (http://www.cert.org.cn/articles/docs/index.shtml) Note: Incident reporting changed in January 2007 to no longer include CN-CERT detection, only voluntary reporting, leading to the significant drop in reports. 12 China-CERT Report (http://www.cert.org.cn/articles/docs/index.shtml Note: Incident reporting changed in January 2007 to no longer include CN-CERT detection, only voluntary reporting, 15 At least until 2006, we observe a dramatic (and perhaps exponential) growth in incidents. After 2006, due to the change in reporting structure of CN-CERT, the trend is difficult to follow. This growth in absolute number of incidents is likely at least as much due to an explosion in Internet users in China as it is due to an increase in vulnerabilities. 1400 1326 1200 1151 1218 1197 1000 890 800 703 563 587 600 475 400 200 0 348 345 320 249 222 161 25 35 77 11 2005 22 39 5 2006 Website Malicious Code Spam Phishing Vulnerabilities Virus/Worm/Trajon Botnet 23 2007 0 2008Q1&Q2 DoS Attack Virus/Worm/Trajon Figure 3.8: CN-CERT – Selected Events per Year, 2005 – 200713 Here we observe a dramatic proportional increase in botnets and spam as reported by CN-CERT. Such attacks typically represent organized for-profit ventures rather than purely destructive attacks, and usually target users, rather than technical defensive network capabilities. Denial of Service attacks actually decline from few to literally none in the first half of 2008, suggesting either a reporting bias or an increase in (already extensive) government cybersecurity defensive effectiveness. leading to the significant drop in reports. 13 China-CERT Report (http://www.cert.org.cn/articles/docs/index.shtml) 16 Virus/Worm/T rojan, 6.57% Website Malicious Code, 21.36% Vulnerabilities, 7.57% Phishing, 27.04% Spam, 37.01% DoS Attack, 0.27% Figure 3.9: CN-CERT Distribution of Incidents by Category, 2008 Q1 & Q214 Virus/Worm/T rajon, 188, 7% Vulnerabilities, 162, 6% Website Malicious Code, 791, 32% Spam, 745, 29% DoS Attack, 10, 0% Phishing, 681, 26% Figure 3.10: CN-CERT Distribution of Incidents by Category, 2007 Q3 & Q415 14 China-CERT Report 2008 Q1 and Q2 (http://www.cert.org.cn/UserFiles/File/CISR2008fh.pdf1.pdf) 15 China-CERT Report 2007 and 2007 Q1 & Q2 (http://www.cert.org.cn/servlet/Articles?channel=docs&for=0&page=2) 17 Virus/Worm/T rajon, 157, 9% Website Malicious Code, 360, 20% Vulnerabilities, 186, 10% Spam, 452, 25% Phishing, 645, 35% DoS Attack, 13, 1% Figure 3.11: CN-CERT Distribution of Incidents by Category, 2007 Q1 & Q2 Throughout 2007 and into 2008, the primary trend observed is a relative increase in spamming; phishing decreases proportionally to some extent, and malicious website code increases briefly and drops again. Website Malicious Code, 320 DoS Attack, 22 Phishing, 563 Botnet, 5 Spam, 587 Virus/Worm/T rojan, 39 Host Invasion, 9 Others, 454 Website Composite, 24477 18 Figure 3.12: CN-CERT Distribution of Incidents by Category, 200616 Website Malicious Code, 25 Botnet, 11 DoS Attack, 35 Phishing, 475 Others, 153 Spam, 161 Virus/Worm/T rojan, 77 Host Invasion, 45 Website Composite, 8130 Figure 3.13: CN-CERT Distribution of Incidents by Category, 200517 Between 2006 and 2007, CN-CERT changed its reporting methodology, removing “Website Composite” from the list of reported incidents on distribution charts. This removal allows the reader to more easily observe trends after 2006, though a significant proportional increase in spam and a proportional decrease in phishing through the 2005-2007 period. Mainland China Hongkong,China Taiwan, China 20 08 2 0 -1 08 2 0 -2 08 2 0 -3 08 2 0 -4 08 2 0 -5 08 2 0 -6 08 2 0 -7 08 2 0 -8 0 2 0 8 -9 08 2 0 -1 0 08 2 0 -1 1 08 20 12 09 2 0 -1 09 2 0 -2 09 -3 10000 9000 8000 7000 6000 5000 4000 3000 2000 1000 0 16 China-CERT Report 2007 Q1 and Q2 (http://www.cert.org.cn/UserFiles/File/2006CNCERTCCAnnualReport_Chinese.pdf) 17 China-CERT Report 2005 (http://www.cert.org.cn/upload/2005CNCERTCCAnnualReport_Chinese.pdf) 19 Figure 3.14: CN-CERT – Websites Attacked in China by Quarter, 2008 Q1 – 2009 Q318 180 160 140 120 100 80 60 Hongkong,China Taiwan, China 40 20 20 08 20 1 08 20 2 08 20 3 08 20 4 08 20 5 08 20 6 08 20 7 08 20 8 08 2 0 -9 08 20 10 08 20 11 08 -1 20 2 09 20 1 09 20 2 09 -3 0 Figure 3.15: CN-CERT – Websites Attacked in Hong Kong and Taiwan by Quarter, 2008 Q1 – 2009 Q3 Over the relatively short period in the above graphs, we observe a downward trend in website attacks in Mainland China, which may be due to increased sophistication in government control. Hong Kong and Taiwan also seem to show a gradual downward trend in attacks, though the trend is not as sharp as in the mainland. 18 China-CERT Web Composite Monthly Report: (http://www.cert.org.cn/) 20 3.3 CERT-IN (India) Examples from CERT-IN are presented below: 800 718 700 600 505 505 500 401 400 300 229 200 155 119 100 43 34 37 61 87 85 49 47 45 39 47 33 46 25 38 37 33 57 61 255 215 139 146 82 O c N t-0 o 6 D v-06 ec Ja -06 n Fe -07 M b-07 a A r-07 p M r-0 ay 7 Ju -07 n Ju -07 A l-0 u 7 Se g-0 p 7 O -07 c N t-0 ov 7 D -07 ec Ja -07 n Fe -08 M b-08 a A r-08 p M r-0 ay 8 Ju -08 nJu 08 A l-0 u 8 Se g-0 p 8 O -08 c N t-0 ov 8 D -08 ec Ja -08 n Fe -09 M b-09 a A r-09 pr -0 9 0 Figure 3.16: CERT-IN – Total Reported Incidents by Month, October 2006 – April 200919 Here we observe a marked and rapid increase in total reported incidents, starting in 2008, with spikes in December 2008 and March 2009. The long-term increase may be due to increases in reporting, vast increases in Internet usage, increases in attacks, or any combination of the three. 19 CERT-In Monthly Security Bulletin: (http://www.cert-in.org.in/knowledgebase/SecurityBulletin/) 21 600 500 400 300 200 100 0 2008-1 2008-2 2008-3 2008-4 2008-5 2008-6 2008-7 2008-8 2008-9 2008- 2008- 2008- 2009-1 2009-2 2009-3 2009-4 10 11 12 Scanning Number Phishing Number Malicious Number SQL Injection Number Spamming Number Website Compromise & Malware Propagation Number Figure 3.17: CERT-IN – Incidents by Category by Month, January 2008 – April 200920 This graph suggests that most incidents reports are on the rise (which is to be expected), except for spamming, which appears to be slowly decreasing over time, suggesting potentially increased spamming defenses (like spamscreens) in deployment. It also suggests that malicious code and website compromise / malware propagation are the major forms of attack in India. It should be noted that this is quite different from the United States, where Phishing is the major reported attack. 20 CERT-In Monthly Security Bulletin: (http://www.cert-in.org.in/knowledgebase/SecurityBulletin/) 22 80.00% 70.00% 60.00% 50.00% 40.00% 30.00% 20.00% 10.00% 0.00% 2008- 2008- 2008- 2008- 2008- 2008- 2008- 2008- 2008- 2008- 2008- 2008- 2009- 2009- 2009- 20091 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4 Scanning Phishing Malicious Code SQL Injection Spamming Website Compromise & Malware Propagation Figure 3.18: CERT-IN - Proportional Incidents by Category by Month, January 2008 – April 200921 In the Figure 3.18 we observe a more marked reduction in the percentage of Phishing, Scanning, and Spamming over time, suggesting that user-oriented attacks have decreased in general. A significant spike (both in “Malicious Code” and “Website Compromise & Malware Propogation”) in January 2009 suggests an anomaly in reporting or recording, leading to the two (admittedly similar) concepts to be switched, though a simple coincidence is possible. Either way, by 2009, attacks on software infrastructure, rather than direct attacks on users, appear to dominate cybersecurity issues in India. 21 CERT-In Monthly Security Bulletin: (http://www.cert-in.org.in/knowledgebase/SecurityBulletin/) 23 3.4 Russia CERT We provide a few examples of data from Russia CERT below: scanning: , 80, 1% unauthorized access, 18, 0% Denial-ofService Attack (DoS Attack), 26, 0% phishing, 1435, 25% scan/passwords bruteforcing , 3, 0% others: , 40, 1% the propagation of malware: phishing Denial-of-Service Attack (DoS Attack) unauthorized access the propagation of malware:, 4091, 73% scanning: scan/passwords bruteforcing others: Figure 3.25: Russia CERT – Proportion of Incidents by Type, 200722 Figure 3.26: Russia CERT – Incidents Reported by Status, 2006-200823 The above graphs indicate that in Russia, user-centered attacks like malware and phishing are high proportions of reported incidents, much like the United States (and unlike India). 22 http://www.cert.ru/stat.html (originally in Russian) 23 http://www.cert.ru/conference2008.html Note: Best interpretation suggests that “Closed(+)” indicates an incident that was resolved to satisfaction; “Closed(-)” indicates an incident that was resolved unsatisfactorily; “Remain” indicates incidents that remain unresolved. 24 3.5 CERT Estonia CERT Estonia, established in 2006, is young, particularly interesting, due to its involvement in constant low-level (and occasionally high-level) cyberwar presumably with Russia. The data examples below are from the Estonian RISO State Information Office24: 70 Computer viruses % of People 60 50 Spam 40 30 20 10 0 2005I 2005II 2006I 2006II 2007I Abuse of personal data sent through the Internet No security-related problems have occurred Figure 3.27: CERT Estonia – Security Problems by Type, as a Percentage of Internet Users, 2005200725 The above graph shows a slightly different story in Estonia than the US or China. Computer viruses take up a much larger proportion of cybersecurity incidents—a larger proportion than even spamming. Reporting methodology may be to blame for this discrepancy: specifically, the survey refers to “security problems” for a particular user—many may not consider spamming a serious “security problem” even if they are spammed. Most users report having had no problems, which may suggest that most indeed had no major problems, or that standards for security in personal users are more lax. 24 For more information on RISO, see http://www.riso.ee/en 25 TNS Emor e-Track survey, http://www.riso.ee/en/files/eSeire_uuringu_internet_security_2007_I_ENG_2005-2007.pdf Note: “I” indicates the first half of the year; “II” indicates the second. 25 100 computer viruses 90 80 spyware 70 % 60 attacks against enterprises' information systems no problems have occurred 50 40 30 20 do not know 10 0 2005 2007 Figure 3.28: CERT Estonia – Security Problems by Type, as a Percentage of Corporate Enterprises, 2005 – 200726 The above graphs reveal that the majority of enterprises in Estonia report that no serious problems have occurred, and that the trend seems to be relatively positive. This is surprising, given Estonia's troubled cyber relationship with its neighbor, Russia, but suggests either that attacks have decreased or that Estonian defenses have become more sophisticated throughout the 2000s or reporting does not capture all events. Furthermore, corporate enterprises seem to report an even lower proportion of security incidents than personal users, though it should be noted that the categories reported are significantly different, making the two results difficult to compare. Furthermore, the lack of differentiation between number of attacks on corporate enterprises leaves open the distinct possibility that certain enterprises are attacked often and deliberately, where others are not high-priority targets to attackers. We do not know if the 10-40% of attacked enterprises were attacked once or a hundred times. 26 TNS Emori uuring "Info - ja kommunikatsioonitehnoloogia kasutamine Eesti ettevõtetes http://www.riso.ee/en/files/Emor_Computer_Security_2007_I_2005-2007.pdf 26 3.6 Summary These examples illustrate a number of interesting key points, some of which will be discussed in more detail later. First, the nature of cybersecurity issues varies widely between different countries, in sometimes surprising ways. Estonia seems to have a surprisingly low number of incidents per enterprise capita, particularly given its history with Russia. The predominant type of threat in China and the United States is against the user directly—phishing, spamming, improper usage, and other attempts to trick the user into compromising his own security; in Russia and India, malware and malicious code attacks are more common, and there is no clear explanation as to why. Second, reporting methods vary significantly between different CERTs. No two CERTs above reported information in the same way; variations in incident or threat definitions, in typology, in frequency and chronological scale, and in reporting methodology (some CERTs report by total number of reports, some by proportion of total incidents, some by proportion of respondents). These inconsistencies make cross-country comparisons (and, presumably, information coordination) challenging – though trends over time might be identifiable. 27 4. The ECIR Data Dashboard 4.1 Purpose The ECIR Data Dashboard is developed to provide historical trend data as well as current statistics and news to policymakers, academics, IT professionals, and other stakeholders. By consulting the Dashboard, the user can compare trends in national-level Cybersecurity threats/vulnerabilities among several countries and/or regions, as well as compare these trends against other relevant national-level statistics to find patterns and correlations. To this extent, the Dashboard provides data in three categories: ◦ Demographic Data: Basic data about a country's population, economy, education level, and other attributes that may affect the development of the country's Internet services or IT security sectors. (Source: World Development Indicators Database) ◦ IT Data: Data outlining the state of the country's IT infrastructure, usage, and security, including Internet bandwidth, users, servers, etc. (Sources: ITU, World Development Indicators, CIA World Factbook ) ◦ Cybersecurity Data: Data provided largely by national CERTs that reflect chronological trends threat/vulnerability statistics. The Dashboard allows the user to select any number of countries and/or regions with which to compare data. While the default x-axis measurement is year (future versions will consider other time scales such as quarter, month), any data can be selected for the y-axis, allowing the user to compare correlations in multiple strands of data. Additionally, the Dashboard allows the user to divide any strand of data into another. This allows the user to compare the data in new ways. For example: dividing population into any measurement creates a “per capita” measurement. Also, the user can compare the viruses reported per number of Internet users. Future versions will further allow the user to compare the viruses reported per number of Internet users per capita, requiring two division functions. Additionally, the user can select to graph the data on a linear or logarithmic scale. The Dashboard thus provides the user with a great amount of flexibility and power in finding exactly what data to compare, how to compare it, and how to illustrate it, so that international cybersecurity can be deeply and robustly investigated. 4.2 Development The Dashboard was developed in three primary parts: web user interface, database generation, and newsfeed. A regulated interface between the user interface front-end and the database back-end allow information flow from the back-end to the front to operate seamlessly and robustly though changes in code. Web User Interface The user interface is a Web application designed to query a database and create graphs of information on-the-fly. The user interface provides a number of fields from which the user can select the countries/regions of interest, the x-axis variable (i.e., start year and end year for the observation) and the y-axis variable (i.e., measurement data to observe) as well as graphing type (linear or logarithmic). 28 The “submit” button sends the request, after which the web application reads the requested data from the back-end database and draws the graph, automatically scaling the axes to reflect a “best fit” view of the data. Figure 4.1: Web User Interface of the Cybersecurity Dashboard Figure 4.1 is a screenshot of the Dashboard configuration. As shown in Figure 4.1, a number of countries are listed in the left side. In the selection list, the countries are grouped into corresponding regions. From the list, the user can select several countries and/or regions of interest27. By selecting the start year and the end year, the user can set the observation period. The Dashboard currently incorporates a chronological range of 2000 to 2008. In the right side of the page, the user can select one or two attributes (i.e., measurement data). In case of two attributes, the user should also select an operator by which the data of interest can be calculated from them. The current Dashboard provides only the Division operator by which Attribute 1 is divided by Attribute 2 can be observed. The user can also set the y-axis to a linear or logarithmic scale – which is particularly helpful when comparing data strands that different considerably in values, such as comparing large and small countries, as illustrated later. 27 Multiple countries can be selected by holding down the “Ctrl” key. 29 Figure 4.2: Example Request to Generate Graph of # Personal Computers per Capita Figure 4.3: Generated Graph of # Personal Computers per Capita Figure 4.2 is a request to display the number of PC per capita of three countries (in this example, China, Croatia, and Estonia) from 2000 to 2004. Figure 4.3 is the resulting screenshot from the Dashboard. For convenience, the actual data from the database is listed in the table below the graph. Database The back-end database of the Dashboard is the Palo MOLAP database28. MOLAP stands for 28 http://www.jedox.com/ 30 “Multidimensional On-Line Analytical Processing,” which is an approach to quickly answer multidimensional analytical queries. The Palo database uses a multidimensional data model, allowing multidimensional structures to organize data and express the relationships between the data. These structures are broken into cubes; the cubes are able to store and access data within the confines of each cube. Each cell within a multidimensional structure contains aggregated data related to elements along each of its dimensions. The output of a MOLAP query is displayed in a matrix format in which the dimensions form the rows and columns, and the relevant measurements form the data values. By using MOLAP database, the Dashboard can quickly answer queries of any aggregated data, such as regional data. Palo consists of a mature MOLAP database server and an Excel add-in. Furthermore, JPalo provides a set of Java API to manipulate the Palo database29. These features make it an excellent choice as the back-end database of the Dashboard. In the current stage, there exists one cube with three dimensions in the Palo MOLAP database. The three dimensions are “Countries”, “Years” and “Attributes”. When the country, year and attribute are determined, the corresponding measurement data can be accessed. Recent Headlines The Dashboard uses Chameleon to create a list of top-relevance recent news headlines. Cameleon is a web extraction engine developed by MIT to automatically extract any piece of data of interest from semi-structured documents (e.g., web pages). In the current stage, the Dashboard lists recent news articles using the search terms “cyber security OR computer spam OR cyber” in Google News30. The Dashboard displays the up-to-date news story snippets at the bottom of the user interface page, with hyperlinks that allow the user to open the full story in a new window or tab on their browser. Figure 4.4: Dashboard Recent Headlines (on July 17, 2009) 29 http://www.jpalo.com/ 30 http://news.google.com/ 31 4.3 Interesting Demonstrations Figure 4.5: Total CERT Reported Incidents from 2003 to 2008 (Linear) Figure 4.5 is a screenshot of the total CERT reported incidents of three countries (China, Malaysia and Brazil) from 2003 to 2008. It shows that the total CERT reported incidents of Brazil are much greater than that of China and Malaysia in almost of all years – the actual amount data is gathered in the table below the chart. Because of the huge differences, the data strands of China and Malaysia are pushed to the bottom of the chart in the linear Y-axis style. Figure 4.6: Total CERT Reported Incidents from 2003 to 2008 (Logarithmic) Figure 4.6 is also a screenshot of the total CERT reported incidents of three countries from figure 4.4 (China, Malaysia and Brazil) from 2003 to 2008. Unlike Figure 4.5, the user uses the logarithmic Yaxis style for the chart, so that the data strands of the three countries are more clearly shown in Figure 4.6. 32 Figure 4.7: Virus/worm/malicious code/malware from 2002 to 2008 (Logarithmic) Figure 4.7 is a screenshot of “Virus/worm/malicious code/malware”, a category of the reported CERT incidents, of two countries (Malaysia and Brazil) from 2002 to 2008 with logarithmic Y-axis style in the chart. Figure 4.8: Percentage of Virus/worm/malicious code/malware from 2002 to 2008 (Logarithmic) Figure 4.8 is a screenshot of “Virus/worm/malicious code/malware” divided by “Total CERT Reported Incidents” of two countries (Malaysia and Brazil) from 2002 to 2008 with logarithmic Y-axis style in the chart. In other words, Figure 4.8 shows the data strands of the percentage of a category of the total reported CERT incidents, in this case, “Virus/worm/malicious code/malware”. 33 Figure 4.9: Dos & Integrity Attacks from 2000 to 2008 (Logarithmic) Figure 4.9 is a screenshot of “Dos & Integrity Attacks”, a category of the reported CERT incidents, of two countries (i.e., Malaysia and Brazil) from 2000 to 2008 with a logarithmic Y-axis style in the chart. Figure 4.10: Percentage of Dos & Integrity Attacks from 2000 to 2008 (Linear) Figure 4.10 is a screenshot of “Dos & Integrity Attacks” divided by “Total CERT Reported Incidents” of two countries (Malaysia and Brazil) from 2000 to 2008 with a linear Y-axis style in the chart. In other words, Figure 4.10 shows the data strands of the percentage of a category of the total reported CERT incidents, in this case, “Dos & Integrity Attacks”. 34 Figure 4.11: Total CERT Reported Incidents per Capita from 2003 to 2007 (Logarithmic) Figure 4.11 is a screenshot of “Total CERT Reported Incidents” divided by “Population” (thus creating a per capita measurement) of two countries, Malaysia and Brazil, from 2003 to 2007 with a logarithmic Y-axis style in the chart. It is interesting that the per capita number of reported incidents started at very different levels (in 2003), but the rate has dropped sharply in Brazil while rising sharply in Malaysia such that they are about equal rates by 2007. Figure 4.12: Electric Power Consumption (kWh) per Capita from 2003 to 2006 (Linear) Figure 4.12 illustrates other types of analyses that can be done, such as “Electric Power Consumption (kWh)” divided by “Population” (creating a per capita measurement) of four countries (China, Malaysia, Germany and USA) from 2003 to 2006 with a linear Y-axis style in the chart. 35 Figure 4.13: GDP (2008 US Dollars) per Capita from 2000 to 2007 (Linear) Figure 4.13 is the screenshot of “GDP (2008 US Dollars)” divided by “Population” (creating a per capita measurement) of three countries (China, USA and Brazil) from 2000 to 2007 with a linear Y-axis style in the chart. 4.4 Current Status of Data Dashboard Prototype The current status as of August 7, 2009, includes a working prototype of the Dashboard. The database has some gaps in cross-time or cross-national CERT coverage. In the next phase, more extensive types of data and better sources of data are being sought. The current variables expressed in the prototype Dashboard include: Demographic Data IT Data Cybersecurity Data Population (#) Internet Users (#) Total incidents (#) Gross Domestic Product (USD) International Bandwidth (MBps) Phishing (#) Software Piracy Losses (USD) Personal Computers (#) Trojan/worm/malware (#) Energy Consumption (KWh/yr) Hosts (#) (D)DoS (#) Total Education Enrollment (%) Secure Servers31 (#) Spam (#) Table 4.1: Variables in the Data Dashboard The current list of countries in the Dashboard are: United States, China, India, Germany, Japan, Republic of Korea, Brazil, Estonia, Latvia, Croatia, Malaysia, Australia. 31 “Secure Servers” are those that use fully cryptographed communication. 36 Both the number of countries and the types of data will be significantly expanded in future versions. The particular cybersecurity data availability of each category, by country, is presented below: Type USA China India Korea Malaysia Brazil Germany Japan Estonia Croatia Latvia Malicious Prop. Code Abs. Abs. Abs. Abs. Abs. None None Prop. None None Phishing Prop. Abs. Abs. None None None None Abs. Prop. None Prop. Scanning Prop. Abs. None None None Abs. None Abs. None None None Spam None Abs. Abs. None Abs. Abs. None None Prop. None None DoS None Abs. None None Abs. Abs. None None None None Prop. Table 4.2: CERT-based Cybersecurity Data by Country32 4.5 Challenges A number of challenges and opportunities for discovery and improvement remain for the Cybersecurity Dashboard project. Data Availability The availability of data varies by category, but is often limited or nonexistent. In particular, the cybersecurity category of data is particularly difficult to find. CERTs are the primary source of such data, but many countries do not have national CERTs, and many national CERTs do not provide much data, if any at all. The lack of data availability will continue to be a pressing challenge for the ECIR Dashboard project. Data Consistency & Reliability Among CERTs that have data available for nation-level threats and vulnerabilities, consistency is a serious problem. Many of the CERTs that have such data have only begun recording data within the past three or four years; this makes historical trend analysis limited in utility. Furthermore, a lack of consistency between CERTs makes the deployment of a single framework for comparison of cybersecurity data difficult. CERTs often do not share similar reporting styles (some report in absolute numbers; some report in percentages only); they often do not share categorization methods for threats/vulnerabilities (identifying different groups into which threats/vulnerabilities fall differs between almost every CERT). There are some very general categories that can be constructed successfully, but they are uncommon. Data consistency and reliability issues will continue to pose a challenge for the ECIR Dashboard project and will be a major focus of our future activities. 32 In this table, “Prop.” represents a source hosting proportional data; “Abs.” represents absolute numerical data; “None” represents no data. Most data threads are not available for all years of the dashboard (2000-2008); most CERTs that publish quantitative data have only published in the past few years; many have not yet released a publication with 2008 data. 37 References "2008 Cyber Security Summary and 2009 Projection." Security China. 31 Dec 2008. 8 Jun 2009 <http://www.anqn.com/news/a/2008-12-31/a09104963-1.shtml>. The CERT Coordination Center (CERT/CC). Pittsburgh: Carnegie Mellon University. <http://www.cert.org> CERT Estonia." RISO State Information System. 28 Aug 2008. RISO State Information System. 11 Jun 2009 <http://www.cert.ru/conference2008.html>. "China Cyber Security Report 2008 Q1 and Q2." 2008. CN CERT/CC. 8 Jun 2009 <http://metc.zzuli.edu.cn/upload/Files/20081216185349.pdf>. “CNCERT/CC Half-yearly Report 2008Q1 & Q2,” CNCERT/CC. 11 Jun 2009 <http://www.cert.org.cn/UserFiles/File/CISR2008fh.pdf1.pdf>. "Computer Hacking and Unauthorized Access Laws." National Conference of State Legislatures. 2009. National Conference of State Legislatures. 8 Jun 2009 <http://www.ncsl.org/IssuesResearch/TelecommunicationsInformationTechnology/ComputerHackingandUna uthorizedAccessLaws/tabid/13494/Default.aspx>. "Cyber Security Tip ST04-012, Browsing Safely: Understanding Active Content and Cookies." National Cyber Alert System. 2009. United States Computer Emergency Readiness Team. 8 Jun 2009 <http://www.uscert.gov/cas/tips/ST04-012.html>. "Cyber Security Tip ST04-014, Avoiding Social Engineering and Phishing Attacks." National Cyber Alert System. 2009. United States Computer Emergency Readiness Team. 8 Jun 2009 <http://www.uscert.gov/cas/tips/ST04-014.html>. "Cyber Security Tip ST04-015, Understanding Denial-of-Service Attacks." National Cyber Alert System. 2009. United States Computer Emergency Readiness Team. 8 Jun 2009 <http://www.us-cert.gov/cas/tips/ST04015.html>. "Cyber Security Tip ST05-007, Risks of File-Sharing Technology." National Cyber Alert System. 2009. United States Computer Emergency Readiness Team. 8 Jun 2009 <http://www.us-cert.gov/cas/tips/ST05-007.html>. "Cyber Security Tip ST05-007, Risks of File-Sharing Technology." National Cyber Alert System. 2009. United States Computer Emergency Readiness Team. 8 Jun 2009 <http://www.us-cert.gov/cas/tips/ST05-007.html>. "Cyber Security Tip ST05-008, How Anonymous Are You?" National Cyber Alert System. 2009. United States Computer Emergency Readiness Team. 8 Jun 2009 <http://www.us-cert.gov/cas/tips/ST05-008.html>. "Cyber Security Tip ST05-011, Effectively Erasing Files." National Cyber Alert System. 2009. United States Computer Emergency Readiness Team. 8 Jun 2009 <http://www.us-cert.gov/cas/tips/ST05-011.html>. "Cyber Security Tip ST06-001, Understanding Hidden Threats: Rootkits and Botnets." National Cyber Alert System. 2009. United States Computer Emergency Readiness Team. 8 Jun 2009 <http://www.uscert.gov/cas/tips/ST06-001.html>. "Cyber Security Tip ST06-006, Understanding Hidden Threats: Corrupted Software Files." National Cyber Alert System. 2009. United States Computer Emergency Readiness Team. 8 Jun 2009 <http://www.uscert.gov/cas/tips/ST06-006.html>. "Denial of Service Attacks." CERT. 2009. Software Engineering Institute, Carnegie Mellon University. 8 Jun 2009 <http://www.cert.org/tech_tips/denial_of_service.html>. "Emerging Cyber Threats Report for 2009." Goergia Tech Information Security Center. 8 Jun 2009 <http://www.gtisc.gatech.edu/pdf/CyberThreatsReport2009.pdf>. Forum for Incident Response and Security Teams. <http://www.first.org>. 38 Appendix A: Sources of Data Currently Used in the Prototype ECIR Dashboard The years covered by the current data used in the prototype ECIR Dashboard is summarized in the table below: # Hosts 2000-2004, Australia 2006-2008 2000-2004, 2006-2008 Brazil 2000-2004, 2006-2008 China 2000-2004, Croatia 2006-2008 2000-2004, Estonia 2006-2008 2000-2004, Germany 2006-2008 2000-2004, 2006-2008 India all 2000-2004, 2006-2008 Latvia 2000-2004, Malaysia 2006-2008 2000-2004, 2007-2008 ROK Japan USA all # Secure # Personal Internet Computers Servers 2001, 2000-2004 2003-2008 2001, 2000-2005 2003-2008 2001, 2000-2006 2003-2008 2001, 2000-2004 2003-2008 2001, 2000-2007 2003-2008 2001, 2000-2006 2003-2008 2001, 2000-2007 2003-2008 2001, 2000-2004 2003-2008 2001, 2000-2006 2003-2008 2001, 2000-2006 2003-2008 2001, 2000-2008 2003-2008 2001, 2000-2006 2003-2008 # Users w/ DoS & Internet Integrity Access Attacks Electric Phishing/ Power International personal Consumpti GDP (2000 Bandwidth data on (kWh) US Dollars) (MB/s) abuse Population Scanning School enrollment, Software tertiary (% Piracy gross) Losses ($M) 2000-2007 none 2000-2006 2000-2007 2000-2005 none 2000-2007 none 2000-2006 2000-2007 all 2000-2006 2000-2007 2000-2005 none 2000-2007 all 2000-2007 2005-2008 2000-2006 2000-2007 2000-2005 2005-2008 2000-2007 2000-2007 none 2000-2006 2000-2007 2000-2005 none 2000-2007 none 2000-2006 2000-2007 2000-2005 2000-2007 none 2000-2006 2000-2007 2000-2007 none 2000-2006 2000-2007 none 2003-2008 2003-2008 2001, 20032008 2000-2007 2000-2005 2000-2003, 2003-2005 2006 2000-2003, none 2005-2006 none 2000-2007 none 2000-2006 2003-2008 2000-2005 none 2000-2007 none none 2000-2007 2000-2005 2007-2008 2000-2007 2007-2008 2000-2006 2003-2008 2001, 20032004, 2007- 2000-2006 2000-2007 2000-2005 none 2000-2007 none 2000-2006 2003-2008 2000-2007 none 2000-2006 2000-2007 2000-2005 none 2000-2007 none 2000-2006 2003-2008 2000-2007 all 2000-2006 2000-2007 2000-2005 none 2000-2007 none 2000-2005 2003-2008 2000-2007 none 2000-2006 2000-2007 2000-2005 none 2000-2007 none 2000-2006 2003-2008 2000-2007 none 2000-2006 2000-2007 2000-2005 none 2000-2007 none 2000-2006 2003-2008 2003-2008 The sources of each of these data fields is listed below: # Hosts: 2000-2004: ITU Data, all other: CIA World Factbook # Personal Computers: 2000-2004: ITU Data, all other: World Development Indicators Database # Secure Internet Servers: World Development Indicators Database # Users w/ Internet Access: World Development Indicators Database DoS & Integrity Attacks: Country-Specific CERT where available Electric Power Consumption (kWh): World Development Indicators GDP (2000 US Dollars): World Development Indicators International Bandwidth (MB/s): World Development Indicators Database Phishing/personal data abuse: Country-Specific CERT where available Population: World Development Indicators Scanning: Country-Specific CERT where available School enrollment, tertiary (% gross): World Development Indicators Database Software Piracy Losses ($M): BSA & IDC Global Software Piracy Study Total CERT Reported Incidents: Country-Specific CERT where available Virus/worm/malicious code/malware: Country-Specific CERT where available The specific resources referred to above are described below: The World Development Indicators Database (WDI) describes itself as “the statistical benchmark that helps measure the progress of development. The WDI provides a comprehensive overview of development drawing on data from the World Bank and more than 30 partners. It includes more than 800 indicators in over 90 tables organized in 6 sections: World View, People, Environment, Economy, States and Markets, and Global Links.” We believe that the World Bank has less reason 39 to mis-represent data than other sources might. Because of this trustworthiness, the WDI is our primary statistical source. For further information, see: http://web.worldbank.org/WBSITE/EXTERNAL/DATASTATISTICS/0,,contentMDK:21725423~p agePK:64133150~piPK:64133175~theSitePK:239419,00.html The Annual BSA and IDC Global Software Piracy Study tracks global losses due to piracy, mainly as a tool for business strategists. To do this they “Determine how much PC packaged software was deployed in [a given year;] Determine how much PC packaged software was paid for/legally acquired in [this given year; and] Subtract one from the other to get the amount of pirated software.” As the data was intended for strategic use, we believe it to be highly trustworthy. Unfortunately, the BSA & IDC Global Software Piracy Study was only begun in 2003 – and do not provide data from previous years. For more information, please see: http://global.bsa.org/globalpiracy2008/index.html The International Telecommunications Union publishes a “The World Telecommunication/ICT Indicators Database [which] contains time series data… for around 100 sets of telecommunication statistics (updated) covering telephone network size and dimension, mobile services, quality of service, traffic, staff, tariffs, revenue and investment… Selected demographic, macro-economic and broadcasting statistics are also included.” Because countries self-report certain series in the ITU database, we believe there is a small risk of inflation. To avoid this, we have only relied on ITU data where the WDI data is notably less complete. For further information, please see: http://www.itu.int/ITU-D/ict/publications/world/world.html An additional resource, The CIA World Factbook “provides information on the history, people, government, economy, geography, communications, transportation, military, and transnational issues for 266 world entities.” The CIA World Factbook receives their data from other groups and databases, including those groups otherwise mentioned here. In the interest of continuity, we have only referenced the CIA World Factbook for data that we could not find in a first-level database. For further information, please see: https://www.cia.gov/library/publications/the-world-factbook/ 40 Appendix B: Summary of Reporting By Selected National CERTs Appendix B is a full summary of the reporting habits of selected National CERTs, and their founding year (if known). Many of these reports do not contain quantitative data or charts; the following appendix should thus not be used as a guide to quantitative data for aggregation projects. Quarterly Report / Half-year Report Yearly Report Not-specified Monthly Report Specified Monthly Report Others Date Formed Asia Pacific Computer Emergency Response Team (contains 15 countries’ CERT, including China) Australia CERT N/A 20032008 N/A N/A N/A N/A N/A N/A N/A N/A 1. Yearly Australian Computer Crime and Security Survey: 2002-2006 (http://www.auscert.org.au/rend er.html?it=2001) 2. AusCERT Newsletter but only access to authorized member, updated until July 2004 N/A Brunei CERT Bangladesh CERT N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A China Halfyearly Report: 2005 2007 N/A Composite Website Monthly N/A May 2004 July 2007, right now the publication tag is not available Oct 2000 Country / Region Asia 41 Country / Region Quarterly Report / Half-year Report Yearly Report Not-specified Monthly Report Specified Monthly Report 2005 -2008 Q1&Q2 N/A N/A N/A N/A Indonesian CSIRT India N/A N/A N/A N/A N/A N/A July 2006 April 2009 Phishing Incidents Trend Report: Jan 2009 -March 2009 Japan CERT-CC Quarterly : 2008Q2 – 2009 Q1 (in Japanes e); 2000Q1 – 2009Q1 , 1996Q4 N/A Hong CERT Kong Korea CERT Korea National N/A Others Date Formed Only available: Alerts received from websites from 2001-2009; Virus alerts from websites from 2001-2009; Number of incidents reported from 2001-2009; Virus incidents reported from 2001 -2009; Almost no tags is available. Events only updated until 2005 N/A Report: 2006 - March 2009 N/A N/A Vulnerabilities Quarterly Report: 2004Q3 – 2008Q4; N/A Weekly Bulletin: Sep 6th 2006 June 10th, 2009 N/A Only 2004 Jan 2006 – Jan 2009 1)Monthly Phishing Activity Trends Report: Feb 2005 – Jan 2009 N/A N/A JUL. 1996 N/A N/A 42 Country / Region Quarterly Report / Half-year Report Yearly Report Myanmar CERT Pakistan CERT Philippine CERT Qatar CERT Russia CERT Specified Monthly Report Others Date Formed N/A Having statistics about number of incidents and distribution of different events from 1997 to 2009 (annually) (http://www.mycert.org.my/en/se rvices/statistic/mycert/2009/mai n/detail/625/index.html) January 13, 1997 N/A Situation al report on major worms outbreak s up to 2003 in Malaysia. N/A Cyber Security: June 2004 – April 2009 (contains events distribution, number of events per month) 2) Cyber threat trends and countermeas ures: Jan 2005 – May 2008 (contains detailed data) N/A N/A N/A N/A Computer Emergency Response Team Malaysia CERT Not-specified Monthly Report Link is not available Defacement statistics from 1999 – 2008. N/A Not available N/A N/A N/A N/A N/A N/A N/A N/A No statistics is found Only2007 events distribution is available only in Russian: http://www.cert.ru/stat.html N/A 43 Quarterly Report / Half-year Report Yearly Report Not-specified Monthly Report Specified Monthly Report Others Date Formed N/A N/A N/A N/A June 2006 N/A N/A N/A N/A Not about statistics: Cyber Security Term Glossary: http://www.slcert.gov.lk/index.ph p?q=8&id=27 N/A N/A N/A N/A N/A N/A No statistics is found Taiwan National Computer Emergency Response Team Thai CERT N/A N/A N/A N/A No statistics is found N/A N/A N/A N/A N/A 2000 Vietnam N/A N/A N/A N/A (English version only has “about Thai CERT). The Thai version needs double check. I could not find any statistics from it. (English version is being established) Link is not available N/A Only vulnerabilities statistics from 1988-2008, and they are no longer publish or collect those data. N/A Its focus is not on publishing the statistics data 1990 Country / Region Sri Lanka CERT Singapore CERT Taiwan Computer Emergency Response Team/Coordinati on Center October 1997 Sep 1987 Dec 2005 North America Canadian Cert Computer Emergency Response Team -Coordinating Centre Forum of Incident N/A N/A N/A N/A 44 Country / Region Quarterly Report / Half-year Report Yearly Report Not-specified Monthly Report Specified Monthly Report Others Date Formed N/A N/A Nov 2007 -May 2009 N/A N/A N/A Quarterly Reports: 2006Q3 -2008 Q4 N/A N/A N/A Only in Mexican N/A N/A N/A N/A N/A May 1999 N/A N/A N/A N/A No published statistics was found Number of Incidents reported. 1997-2009 (yearly and monthly) http://www.rnp.br/en/cais/statisti cs/ 2000Q1, 2003Q12009Q1 ((http://w ww.cert.b r/stats/) Halfyear: 1999, 2000, The same as above 19992008 (http://ww w.cert.br/s tats/) N/A Spam: Jan 2009- April 2009; Number of spam (yearly): 2003 - 2009 1)Daily statistics for the network flow data directed to honeypots from the Brazilian Honeypots Alliance (http://www.honeypotsalliance.org.br/stats/) 2) Total number of incidents reported 1999 - 2009 The same as above The same as above The same as above The same as above N/A Did not find English version N/A The English version is only partly translated. N/A Response and Security Teams US-CERT Mexico (MX) South America Argentinian CERT CAIS- Brazilian Research Network CSIRT Computer Emergency Response Team Brazil NIC BR Security Office Brazilian CERT European Austrian CERT N/A N/A N/A N/A Belgian CERT Crotian CERT N/A N/A N/A N/A N/A N/A N/A N/A Czech Republic N/A N/A N/A N/A N/A N/A N/A N/A 1996? 45 Country / Region Quarterly Report / Half-year Report Yearly Report Not-specified Monthly Report Specified Monthly Report CERT Danish CERT Estonian CERT N/A N/A N/A N/A Finland CERT France Industry,services and Tertiary CERT French CERT N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A German CERT N/A N/A N/A N/A Greek Research and Technology Network CERT Hungarian CERT Iceland Ireland Israeli CERT N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A Israeli Government CERT Italian CERT Others Date Formed English version covers almost nothing and online translation is not working for this website. Cannot write any summry here because of language. http://www.riso.ee/en/node/22 has the only available data: 2005 - 2007 No statistics was found No statistics was found N/A N/A No statistics was found. No English version. http://www.cert.dfn.de/index.php ?id=aw-typen contains examples of reports for some events, such as defacement, Phishing; only in German. No English version is available. No statistics was found. N/A No statistics was found Link is not available No statistics was found No Israeli-oriented data was found. Only contains document links for other reports. N/A No statistics can be access unless register 1994 N/A N/A N/A N/A 46 Quarterly Report / Half-year Report Yearly Report Not-specified Monthly Report Specified Monthly Report Others Date Formed Latvian CERT N/A N/A N/A N/A N/A Lithuanian CERT N/A N/A N/A N/A Netherlands CERT Norwegian Computer Emergency Response Team N/A Yearly statistic: 20012008 N/A Only the current 3 months’ event distribution is available (in one graph and in Latvian) http://www.ddirv.lv/?cat=3 N/A N/A N/A N/A N/A N/A N/A Jan 2006 Norwegian Network for Research Education CERT Poland CERT Research and Academic Network Portuguese CERT N/A N/A Jan 2009 – April 2009, do not contain data such as number of incidents, distribution of different events: N/A N/A No statistics was found N/A N/A N/A N/A N/A The link to CERT Polska (www.cert.pl) is not available. (1993) N/A N/A N/A Slovenian CERT Spanish CERT N/A N/A N/A N/A Jan 2005 – March 2009, only available in Portuguese. N/A N/A Country / Region N/A N/A N/A N/A No statistics was found Only number of vulnerabilities from 2005-2009, vulnerabilities N/A N/A 47 Quarterly Report / Half-year Report Yearly Report Not-specified Monthly Report Specified Monthly Report Sweden Swiss Academic and Research Network CERT N/A N/A N/A N/A Turkish CSIRT N/A N/A N/A N/A United Kingdom N/A N/A N/A N/A Country / Region Others data in 2008 and 2009. No statistics was found Internet Background Noise (IBN) 2003 – 2009 (http://www.switch.ch/se curity/services/IBN/) The statistics page has nothing about number of incidents or distribution of events: http://www.ulakbim.gov.tr/ulakne t/istatistik/ No statistics about cyber events was found Date Formed N/A 1987 N/A